From Juniper Router NDM Security Technical Implementation Guide
Part of SRG-APP-000120-NDM-000237
Associated with: CCI-000164
Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity.
Review the router configuration to verify that it is compliant with this requirement. The configuration example below depicts a class JR_ENGINEER which does not permit users belonging to the class to delete files or make changes to logging parameters. login { class JR_ENGINEER { permissions all; deny-commands "(file delete)"; deny-configuration "(system syslog)"; } } Note: The predefined classes operator and Read-only do not have permissions to delete files. If the router is not configured to protect audit information from unauthorized deletion, this is a finding.
Configure one or more classes as shown in the example below whose users will not be permitted to delete files or make changes to logging parameters. [edit system] set login class JR_ENGINEER permissions all set login class JR_ENGINEER deny-configuration "(system syslog)" set login class JR_ENGINEER deny-commands “(file delete)”
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer